-
Notifications
You must be signed in to change notification settings - Fork 173
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Issue] azd up
fails first time on todo-nodejs-mongo-aca
#3157
Comments
The python version fails to deploy too.
azd version: azd version 1.5.1 (commit 3856d1e) |
related to: #2980 |
Node.js as per request
|
Requested to try following options:
I started with #3 because that was the easiest. It failed.
|
This is the change that fixed it for me.
|
We might as well do this until the underlying issue that prevents a co-administrator from exchanging their AAD token for a token that can do the push is fixed (Azure/acr#723). We might also consider improving the error message here. We might be able to check if the current principal has "Owner" permissions granted on the ACA. Long term it would be good to keep this |
This enables the admin user on the provisioned container registry so that `azd` can connect to it to push even if RBAC is not working because the user is not anowner of the resource. We've seen cases where users who's accounts where created a long while back are set as [classic adminisrators](https://learn.microsoft.com/en-us/azure/role-based-access-control/classic-administrators) and not Owners on their accounts and ther is presently a service issue that prevents these users from exchanging their AAD creds for an access token. Fixes Azure#3157
This enables the admin user on the provisioned container registry so that `azd` can connect to it to push even if RBAC is not working because the user is not an owner of the resource. We've seen cases where users who's accounts where created a long while back are set as [classic administrators](https://learn.microsoft.com/en-us/azure/role-based-access-control/classic-administrators) and not Owners on their accounts and there is presently a service issue that prevents these users from exchanging their AAD creds for an access token. Fixes #3157
Output from
azd version
Run
azd version
and copy and paste the output here: azd version 1.5.0 (commit 012ae73)Describe the bug
Initial deploy fails - output at bottom of this issue.
To Reproduce
azd auth login
azd up
Expected behavior
Success on first
azd up
Environment
Information on your environment:
* Language name and version
* IDE and version : [e.g. Visual Studio 16.3]
Additional context
The text was updated successfully, but these errors were encountered: